Search results for: water security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10886

Search results for: water security

10526 Harnessing Entrepreneurial Opportunities for National Security

Authors: Itiola Kehinde Adeniran

Abstract:

This paper investigated the influence of harnessing entrepreneurial opportunities on the national security in Nigeria with a specific focus on the security situation of the post-amnesty programmes of the Federal Government in Ondo State. The self-administered structured questionnaire was employed to collect data from one hundred and twenty participants through purposive sampling method. Inferential statistics was used to analyze the data, specifically; ordinary least squares linear regression method was employed with the aid of statistical package for social science (SPSS) version 20 in order to determine the influence of independent variable (entrepreneurial opportunities) on dependent variable (national security). The result showed that business opportunities have a significant influence on the rate of criminal activities. The study also revealed that entrepreneurial opportunity creation and discovery as well as providing a model on how these entrepreneurial opportunities could be effectively and efficiently utilized jointly predict better national security, which counted for 69% variance of crime rate reduction. The paper, therefore, recommended that citizens should be encouraged to develop an interest in the skill-based activities in order to change their mindset towards self-employment which can motivate them in identify entrepreneurial opportunities.

Keywords: entrepreneurship, entrepreneurial opportunities, national security, unemployment

Procedia PDF Downloads 304
10525 Impact of Climate Change on Water Resource Systems in Taiwan

Authors: Chia-Ling Chang, Hao-Bo Chang

Abstract:

Global climate change alters rainfall characteristics, while the variation of these characteristics further influences environmental conditions, such as hydrologic responses, landslide areas, and the amounts of diffuse pollution. The variations of environmental conditions may impact the stability of water resource systems. The objective of this study is to assess the present conditions of major water resource systems in Taiwan. The impact of climate change on each system is also discussed herein. Compared to the water resource systems in northern Taiwan, the ratio of the precipitation during the rainy season to that during the dry season has a larger increase in southern Taiwan. This variation of hydrologic condition impacts the stability of water resource systems and increases the risk of normal water supply. The findings in this work can be important references for water resource management.

Keywords: basin management, climate change, water resource system, water resource management

Procedia PDF Downloads 352
10524 The Adaptive Properties of the Strategic Assurance System of the National Economy Sustainability to the Economic Security Threats

Authors: Badri Gechbaia

Abstract:

Adaptive management as a fundamental element of the concept of the assurance of economy`s sustainability to the economic security of the system-synergetic type has been considered. It has been proved that the adaptive sustainable development is a transitional phase from the extensive one and later on from the rapid growth to the sustainable development. It has been determined that the adaptive system of the strategic assurance of the sustainability of the economy to the economic security threats is formed on the principles of the domination in its complex of the subsystems with weightier adaptive characteristics that negate the destructive influence of external and internal environmental factors on the sustainability of the national economy.

Keywords: adaptive management, adaptive properties, economic security, strategic assurance

Procedia PDF Downloads 475
10523 Defence Diplomacy and Collective Security in Africa: Case of Rwanda Defence Forces

Authors: Emmanuel Mugiraneza

Abstract:

Rwanda uses defence diplomacy to pursue international collective security through different mechanisms. This paper shows that with an intent of promoting international collective security, Rwanda has constituted its defense diplomacy policy in three standpoints. First, Rwanda has formed strategic cooperation alliances with state actors, regional and international Organizations that enables her to participate in and promote international collective peace, security and cooperation. Secondary, Rwanda uses defence diplomacy to foster cooperation in to pre-empt, minimize and neutralize potential triggers that would lead to the outbreak of international conflict. Thirdly, Rwanda implements defence diplomacy policy strategy through internationally recognized operational and tactical standards while dispelling hostilities, assisting the friendly nation’s forces and or building and maintaining public confidence and trust in the areas where Rwanda Defence Force deploys for peacekeeping missions in Sudan, South Sudan, Central African Republic and Mozambique for a counterterrorism mission.

Keywords: defence diplomacy, collective security, Rwanda, Peacekeeping

Procedia PDF Downloads 96
10522 Proposal of a Model Supporting Decision-Making on Information Security Risk Treatment

Authors: Ritsuko Kawasaki, Takeshi Hiromatsu

Abstract:

Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Therefore, this paper provides a model which supports the selection of measures by applying multi-objective analysis to find an optimal solution. Additionally, a list of measures is also provided to make the selection easier and more effective without any leakage of measures.

Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization

Procedia PDF Downloads 352
10521 Physiological and Biochemical Based Analysis to Assess the Efficacy of Mulch under Partial Root Zone Drying in Wheat

Authors: Salman Ahmad, Muhammad Aown Sammar Raza, Muhammad Farrukh Saleem, Rashid Iqbal, Muhammad Saqlain Zaheer, Muhammad Usman Aslam, Imran Haider, Muhammad Adnan Nazar, Muhammad Ali

Abstract:

Among the various abiotic stresses, drought stress is one of the most challenging for field crops. Wheat is one of the major staple food of the world, which is highly affected by water deficit stress in the current scenario of climate change. In order to ensure food security by depleting water resources, there is an urgent need to adopt technologies which result in sufficient crop yield with less water consumption. Mulching and partial rootzone drying (PRD) are two important management techniques used for water conservation and to mitigate the negative impacts of drought. The experiment was conducted to screen out the best-suited mulch for wheat under PRD system. Two water application techniques (I1= full irrigation I2= PRD irrigation) and four mulch treatments (M0= un-mulched, M1= black plastic mulch, M2= wheat straw mulch and M4= cotton sticks mulch) were conducted in completely randomized design with four replications. The treatment, black plastic mulch was performed the best than other mulch treatments. For irrigation levels, higher values of growth, physiological and water-related parameters were recorded in control treatment while, quality traits and enzymatic activities were higher under partial root zone drying. The current study concluded that adverse effects of drought on wheat can be significantly mitigated by using mulches but black plastic mulch was best suited for partial rootzone drying irrigation system in wheat.

Keywords: antioxidants, leaf water relations, Mulches, osmolytes, partial root zone drying, photosynthesis

Procedia PDF Downloads 233
10520 Ingini Seeds: A Qualitative Study on Its Use in Water Purification in the Dry Zone of Sri Lanka

Authors: Iranga Weerakkody, Palitha Sri Geegana Arachchige, Dasith Tilakaratna

Abstract:

The aim of this research is to study how folk wisdom can be applied to assist in the process of purification of water. This is qualitative research, and by random sampling, it is focused on to the dry zone of Sri Lanka. The research limitation has been set to the use of Ingini seeds (Strychnos potatorum) to purify water. Here the research is based on connecting traditional knowledge regarding water purification using Ingini seeds to modern times and the advantages and disadvantages of using Ingini seeds to purify water sources. Ingini seeds have been used among villagers of the dry zone to purify water for a long time by methods such as planting Ingini plants around water sources and depositing seeds covered with a cotton cloth inside wells. Crushed Ingini seeds have been put into clay water pots to reduce the hardness of water, as well as the number of impurities present in the water. This shows that Ingini seeds have a property that is successful in precipitating dissolved impurities in water. Ingini seeds are also used to precipitate solid impurities in herbal wine. The advantages of using Ingini seeds are that it can be obtained naturally from the ecology without an additional cost and that it is completely organic forest produce. Another specialty is that in practices, it is used to treat kidney stones and other water-related diseases affecting the kidneys.

Keywords: folklife, Ingini seeds, Strychnos potatorum, organic forest produce, water purification

Procedia PDF Downloads 153
10519 Blockchain Technology Security Evaluation: Voting System Based on Blockchain

Authors: Omid Amini

Abstract:

Nowadays, technology plays the most important role in the life of human beings because people use technology to share data and to communicate with each other, but the challenge is the security of this data. For instance, as more people turn to technology in the world, more data is generated, and more hackers try to steal or infiltrate data. In addition, the data is under the control of the central authority, which can trigger the challenge of losing information and changing information; this can create widespread anxiety for different people in different communities. In this paper, we sought to investigate Blockchain technology that can guarantee information security and eliminate the challenge of central authority access to information. Now a day, people are suffering from the current voting system. This means that the lack of transparency in the voting system is a big problem for society and the government in most countries, but blockchain technology can be the best alternative to the previous voting system methods because it removes the most important challenge for voting. According to the results, this research can be a good start to getting acquainted with this new technology, especially on the security part and familiarity with how to use a voting system based on blockchain in the world. At the end of this research, it is concluded that the use of blockchain technology can solve the major security problem and lead to a secure and transparent election.

Keywords: blockchain, technology, security, information, voting system, transparency

Procedia PDF Downloads 99
10518 An Experimental Investigation of Air Entrainment Due to Water Jets in Crossflows

Authors: Mina Esmi Jahromi, Mehdi Khiadani

Abstract:

Vertical water jets discharging into free surface turbulent cross flows result in the ingression of a large amount of air in the body of water and form a region of two-phase air-water flow with a considerable interfacial area. This research presents an experimental study of the two-phase bubbly flow using image processing technique. The air ingression and the trajectories of bubble swarms under different experimental conditions are evaluated. The rate of air entrainment and the bubble characteristics such as penetration depth, and dispersion pattern were found to be affected by the most influential parameters of water jet and cross flow including water jet-to-crossflow velocity ratio, water jet falling height, and cross flow depth. This research improves understanding of the underwater flow structure due to the water jet impingement in crossflow and advances the practical applications of water jets such as artificial aeration, circulation, and mixing where crossflow is present.

Keywords: air entrainment, image processing, jet in cross flow, two-phase flow

Procedia PDF Downloads 340
10517 Radical Islam and Transnational Security: West Africa and the Asia Pacific in View

Authors: Olumide A. Fafore, Khondlo Mtshali

Abstract:

The beginning of the 21st century saw the emergence of new and global threats to national and transnational security in West Africa and the Asia Pacific regions as a result of the spread of jihadist terrorism across borders, a manifestation of the rise of radical Islam. Extremist and armed Islamic movements influenced by Salafism, the Jihad in Afghanistan and the Muslim Brotherhood are prevalent in Northern Nigeria, Niger, Cameroon, Mali, Chad, Pakistan, Afghanistan, and India. Carrying out attacks across borders, including assassinations, murders, armed robberies, and kidnapping, assisted by open and porous borders and large flow of illegal immigrants across borders. This paper examines the effect of Radical Islam on Transnational security through a review of past literature and the social and security consequences on the people of the regions. Our findings indicate that the activities of armed Islamic movements such as Boko Haram, Ansaru and Al-Qaeda are having a negative impact on the economy, development, and security of the states and people of West Africa and the Asia Pacific. It stresses the importance of regional, transnational and international cooperation, as these threats to national and transnational security can no longer be solved in a national or regional framework.

Keywords: Islamic movements, jihadist terrorism, radical Islam, transnational security

Procedia PDF Downloads 139
10516 Studies on the Solubility of Oxygen in Water Using a Hose to fill the Air with Different Shapes

Authors: Wichan Lertlop

Abstract:

This research is to study the solubility of oxygen in water taking the form of aeration pipes that have different shaped objectives of the research to compare the amount of oxygen dissolved in the water, whice take the form of aeration pipes. Shaped differently When aeration 5 minutes on air for 10 minutes, and when air fills 30 minutes, as well as compare the durability of the oxygen is dissolved in the water of the inlet air refueling shaped differently when you fill the air 30 minutes and when. aeration and 60 minutes populations used in this study, the population of pond water from Rajabhat University in February 2014 used in this study consists of 1. Aerator 2. Hose using a hose to fill the air with 3 different shape, different shapes pyramid whose base is on the water tank. Shaped rectangular water tank onto the ground. And shapes in a vertical pipe. 3 meter, dissolved oxygen, dissolved in water to get the calibration standard. 4. The clock for timer 5. Three water tanks which are 39 cm wide, 51 cm long and 32 cm high.

Keywords: aeration, dissolve oxygen, different shapes

Procedia PDF Downloads 288
10515 Solar Photovoltaic Pumping and Water Treatment Tools: A Case Study in Ethiopian Village

Authors: Corinna Barraco, Ornella Salimbene

Abstract:

This research involves the Ethiopian locality of Jeldi (North Africa), an area particularly affected by water shortage and in which the pumping and treatment of drinking water are extremely sensitive issues. The study aims to develop and apply low-cost tools for the design of solar water pumping and water purification systems in a not developed country. Consequently, two technical tools have been implemented in Excel i) Solar photovoltaic Pumping (Spv-P) ii) Water treatment (Wt). The Spv-P tool was applied to the existing well (depth 110 [m], dynamic water level 90 [m], static water level 53 [m], well yield 0.1728 [m³h⁻¹]) in the Jeldi area, where estimated water demand is about 50 [m3d-1]. Through the application of the tool, it was designed the water extraction system of the well, obtaining the number of pumps and solar panels necessary for water pumping from the well of Jeldi. Instead, the second tool Wt has been applied in the subsequent phase of extracted water treatment. According to the chemical-physical parameters of the water, Wt returns as output the type of purification treatment(s) necessary to potable the extracted water. In the case of the well of Jeldi, the tool identified a high criticality regarding the turbidity parameter (12 [NTU] vs 5 [NTU]), and a medium criticality regarding the exceeding limits of sodium concentration (234 [mg/L Na⁺] vs 200 [mg/L Na⁺]) and ammonia (0.64 [mg/L NH³-N] vs 0.5 [mg/L NH³-N]). To complete these tools, two specific manuals are provided for the users. The joint use of the two tools would help reduce problems related to access to water resources compared to the current situation and represents a simplified solution for the design of pumping systems and analysis of purification treatments to be performed in undeveloped countries.

Keywords: drinking water, Ethiopia, treatments, water pumping

Procedia PDF Downloads 130
10514 Water Management of Polish Agriculture and Adaptation to Climate Change

Authors: Dorota M. Michalak

Abstract:

The agricultural sector, due to the growing demand for food and over-exploitation of the natural environment, contributes to the deepening of climate change, on the one hand, and on the other hand, shrinking freshwater resources, as a negative effect of climate change, threaten the food security of each country. Therefore, adaptation measures to climate change should take into account effective water management and seek solutions ensuring food production at an unchanged or higher level, while not burdening the environment and not contributing to the worsening of the negative consequences of climate change. The problems of Poland's water management result not only from relatively small, natural water resources but to a large extent on the low efficiency of their use. Appropriate agricultural practices and state solutions in this field can contribute to achieving significant benefits in terms of economical water management in agriculture, providing a greater amount of water that could also be used for other purposes, including for purposes related to environmental protection. The aim of the article is to determine the level of use of water resources in Polish agriculture and the advancement of measures aimed at adapting Polish agriculture in the field of water management to climate change. The study provides knowledge about Polish legal regulations and water management tools, the shaping of water policy of Polish agriculture against the background of EU countries and other sources of energy, and measures supporting Polish agricultural holdings in the effective management of water resources run by state budget institutions. In order to achieve the above-mentioned goals, the author used research tools such as the analysis of existing sources and a survey conducted among five groups of entities, i.e. agricultural advisory centers and departments, agricultural, rural and environmental protection departments, regional water management boards, provincial agricultural chambers and restructuring and modernization of agriculture. The main conclusion of the analyses carried out is the low use of water in Polish agriculture in relation to other EU countries, other sources of intake in Poland, as well as irrigation. The analysis allows us to observe another problem, which is the lack of reporting and data collection, which is extremely important from the point of view of the effectiveness of adaptation measures to climate change. The results obtained from the survey indicate a very low level of support for government institutions in the implementation of adaptation measures to climate change and the water management of Polish farms. Some of the basic problems of the adaptation policy to change climate with regard to water management in Polish agriculture include a lack of knowledge regarding climate change, the possibilities of adapting, the available tools or ways to rationalize the use of water resources. It also refers to the lack of ordering procedures and the separation of responsibility with a proper territorial unit, non-functioning channels of information flow and practically low effects.

Keywords: water management, adaptation policy, agriculture, climate change

Procedia PDF Downloads 117
10513 Assessment of Pastoralist-Crop Farmers Conflict and Food Security of Farming Households in Kwara State, Nigeria

Authors: S. A. Salau, I. F. Ayanda, I. Afe, M. O. Adesina, N. B. Nofiu

Abstract:

Food insecurity is still a critical challenge among rural and urban households in Nigeria. The country’s food insecurity situation became more pronounced due to frequent conflict between pastoralist and crop farmers. Thus, this study assesses pastoralist-crop farmers’ conflict and food security of farming households in Kwara state, Nigeria. The specific objectives are to measure the food security status of the respondents, quantify pastoralist- crop farmers’ conflict, determine the effect of pastoralist- crop farmers conflict on food security and describe the effective coping strategies adopted by the respondents to reduce the effect of food insecurity. A combination of purposive and simple random sampling techniques will be used to select 250 farming households for the study. The analytical tools include descriptive statistics, Likert-scale, logistic regression, and food security index. Using the food security index approach, the percentage of households that were food secure and insecure will be known. Pastoralist- crop farmers’ conflict will be measured empirically by quantifying loses due to the conflict. The logistic regression will indicate if pastoralist- crop farmers’ conflict is a critical determinant of food security among farming households in the study area. The coping strategies employed by the respondents in cushioning the effects of food insecurity will also be revealed. Empirical studies on the effect of pastoralist- crop farmers’ conflict on food security are rare in the literature. This study will quantify conflict and reveal the direction as well as the extent of the relationship between conflict and food security. It could contribute to the identification and formulation of strategies for the minimization of conflict among pastoralist and crop farmers in an attempt to reduce food insecurity. Moreover, this study could serve as valuable reference material for future researches and open up new areas for further researches.

Keywords: agriculture, conflict, coping strategies, food security, logistic regression

Procedia PDF Downloads 151
10512 Assessment of Quality of Drinking Water in Residential Houses of Kuwait by Using GIS Method

Authors: Huda Aljabi

Abstract:

The existence of heavy metals similar to cadmium, arsenic, lead and mercury in the drinking water be able to be a threat to public health. The amount of the substances of these heavy metals in drinking water has expected importance. The National Primary Drinking Water Regulations have set limits for the concentrations of these elements in drinking water because of their toxicity. Furthermore, bromate shaped during the disinfection of drinking water by Ozonation can also be a health hazard. The Paper proposed here will concentrate on the compilation of all available data and information on the presence of trace metals and bromate in the drinking water at residential houses distributed over different areas in Kuwait. New data will also be collected through a sampling of drinking water at some of the residential houses present in different areas of Kuwait and their analysis for the contents of trace metals and bromate. The collected data will be presented on maps showing the distribution of these metals and bromate in the drinking water of Kuwait. Correlation among different chemical parameters will also be investigated using the GRAPHER software. This will help both the Ministry of Electricity and Water (MEW) and the Ministry of Health (MOH) in taking corrective measures and also in planning the infrastructure activities for the future.

Keywords: bromate, ozonation, GIS, heavy metals

Procedia PDF Downloads 152
10511 Assessment of Environmental Impact of Rain Water and Industrial Water Leakage in the Libyan Iron and Steel Company in the Sea Water

Authors: Mohamed Alzarug Aburugba, Rashid Mohamed Eltanashi

Abstract:

Rainwater is considered an essential water resource, as it contributes to filling the deficit in water resources, especially in countries that suffer from a scarcity of natural water sources. One of the important issues facing the Water and Gas Services Department at the Libyan Iron and Steel Company is the large loss of quantities of industrial water, both direct and indirect cooling water (DCW, ICW), produced within the company due to leaks in the cooling systems of the factories of the Libyan Iron and Steel Company. These amounts of polluted industrial water leakage are mixed with rainwater collected by stormwater stations (6 stations) in LISCO, which is pumped to the sea through pumps with a very high flow rate, and thus, this will carry a lot of waste, heavy metals, and oils to the sea, which negatively affects marine environmental resources. This paper assesses the environmental impact of the quantities of rainwater and mixed industrial water in stormwater stations in the Libyan Iron and Steel Company and methods of mitigation, treating pollutants and reusing them as industrial water in the production processes of the steel industry.

Keywords: rainwater, mitigation, impact, sewage, heavy metals, assessment, pollution, environment, natural resources, industrial water.

Procedia PDF Downloads 32
10510 Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application

Authors: Ku Aina Afiqah Ku Adzman, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba

Abstract:

NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System.

Keywords: Near Field Communication (NFC), risk assessment, multi-criteria decision making, Analytical Hierarchy Process (AHP)

Procedia PDF Downloads 280
10509 Research on Steam Injection Technology of Extended Range Engine Cylinder for Waste Heat Recovery

Authors: Zhiyuan Jia, Xiuxiu Sun, Yong Chen, Liu Hai, Shuangqing Li

Abstract:

The engine cooling water and exhaust gas contain a large amount of available energy. In order to improve energy efficiency, a steam injection technology based on waste heat recovery is proposed. The models of cooling water waste heat utilization, exhaust gas waste heat utilization, and exhaust gas-cooling water waste heat utilization were constructed, and the effects of the three modes on the performance of steam injection were analyzed, and then the feasibility of in-cylinder water injection steam technology based on waste heat recovery was verified. The research results show that when the injection water flow rate is 0.10 kg/s and the temperature is 298 K, at a cooling water temperature of 363 K, the maximum temperature of the injection water heated by the cooling water can reach 314.5 K; at an exhaust gas temperature of 973 K and an exhaust gas flow rate of 0.12 kg/s, the maximum temperature of the injection water heated by the exhaust gas can reach 430 K; Under the condition of cooling water temperature of 363 K, exhaust gas temperature of 973 K and exhaust gas flow rate of 0.12 kg/s, after cooling water and exhaust gas heating, the maximum temperature of the injection water can reach 463 K. When the engine is 1200 rpm, the water injection volume is 30 mg, and the water injection time is 36°CA, the engine power increases by 2% and the fuel consumption is reduced by 2.6%.

Keywords: cooling water, exhaust gas, extended range engine, steam injection, waste heat recovery

Procedia PDF Downloads 162
10508 Social Security Reform and Management: The Case of Three Member Territories of the Organisation of Eastern Caribbean States

Authors: Cleopatra Gittens

Abstract:

It has been recognized that some social security and national insurance systems in the Eastern Caribbean are experiencing ageing populations and economic and other crises that will present a financial challenge of being unable to pay pension benefits in fifteen to twenty years. This has implications for the fiscal and economic positions of the countries themselves. Hence, organizations would need to address the issue urgently. The study adds to the body of knowledge on social security systems and social security reforms in small island developing states (SIDS). It also makes recommendations for the types of reforms that social security systems in other SIDS can implement given their special circumstances. Secondary research is used to gather financial and other related information on three social security schemes in the Eastern Caribbean. Actuarial and financial reports and other documents of the social security systems are analysed to obtain financial and static data on each of the schemes. The findings show that the three schemes studied are experiencing steady increases in benefit expenditure versus contributions and increasing pensioner to insured ratios. The schemes will deplete their reserves between 2038 and 2050. Two of the schemes have increased their retirement age while the other has not embarked on any reforms. One scheme has made changes to its contribution percentages. Due to their small size, small populations and other unique circumstances, the social security schemes in the identified territories are not likely to be able to take advantage of all of the reform initiatives that the developed world embarked on when faced with similar problems. These schemes will need to make incremental changes that align with the timeframes recommended by the actuarial studies.

Keywords: benefits, pension, small island developing states, social security reform

Procedia PDF Downloads 66
10507 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: cyber-attacks, home user, prevention, security, technology

Procedia PDF Downloads 368
10506 Pinch Technology for Minimization of Water Consumption at a Refinery

Authors: W. Mughees, M. Alahmad

Abstract:

Water is the most significant entity that controls local and global development. For the Gulf region, especially Saudi Arabia, with its limited potable water resources, the potential of the fresh water problem is highly considerable. In this research, the study involves the design and analysis of pinch-based water/wastewater networks. Multiple water/wastewater networks were developed using pinch analysis involving direct recycle/material recycle method. Property-integration technique was adopted to carry out direct recycle method. Particularly, a petroleum refinery was considered as a case study. In direct recycle methodology, minimum water discharge and minimum fresh water resource targets were estimated. Re-design (or retrofitting) of water allocation in the networks was undertaken. Chemical Oxygen Demand (COD) and hardness properties were taken as pollutants. This research was based on single and double contaminant approach for COD and hardness and the amount of fresh water was reduced from 340.0 m3/h to 149.0 m3/h (43.8%), 208.0 m3/h (61.18%) respectively. While regarding double contaminant approach, reduction in fresh water demand was 132.0 m3/h (38.8%). The required analysis was also carried out using mathematical programming technique. Operating software such as LINGO was used for these studies which have verified the graphical method results in a valuable and accurate way. Among the multiple water networks, the one possible water allocation network was developed based on mass exchange.

Keywords: minimization, water pinch, water management, pollution prevention

Procedia PDF Downloads 453
10505 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia

Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki

Abstract:

Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.

Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering

Procedia PDF Downloads 130
10504 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment

Authors: Dengpan Wu, Dan Liu

Abstract:

In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.

Keywords: cloud security, memory isolation, xen, virtual machine

Procedia PDF Downloads 372
10503 Beyond the Economics of Food: Household Food Strategies in Clusters of the Umkhanyakude District Municipality

Authors: Mduduzi Nhlozi

Abstract:

Food insecurity continues to persist in rural areas of South Africa today. A number of factors can be attributed to this including declining rural economies, rising unemployment, natural disasters such as drought as well as shifting cultural norms, values, traditions and beliefs. This paper explores mechanisms used by rural households to achieve food security in the midst of various threats and risks to their livelihoods. The study used semi-structured questionnaire to collect information on lived experiences of households in their quest to access and ensure availability of food. The paper finds that households use a number of food strategies namely economy-related, culture-related and rite-of-passage related strategies to achieve food security. The thrust of argument in the paper is that there is a need for food security studies to move beyond the orthodox, economic analytic framework, towards new institutional economics, focusing on local governance and socio-cultural systems supporting households to achieve food security. It advocates for localised food security plans to be developed by local municipalities to improve food security status for rural households.

Keywords: household, food insecurity, food strategies, new institutional economics, umkhanyakude

Procedia PDF Downloads 93
10502 Alternative (In)Security: Using Photovoice Research Methodology to Explore Refugee Anxieties in Lebanon

Authors: Jessy Abouarab

Abstract:

For more than half a century, international norms related to refugee security and protection have proliferated, yet their role in alleviating war’s negative impacts on human life remains limited. The impact of refugee-security processes often manifests asymmetrically within populations. Many issues and people get silenced due to narrow security policies that focus either on abstract threat containment and refugee control or refugee protection and humanitarian aid. (In)security practices are gendered and experienced. Examining the case study of Syrian refugees in Lebanon, this study explores the gendered impact of refugee security mechanisms on local realities. A transnational feminist approach will be used to position this research in relation to existing studies in the field of security and the refugee-protection regime, highlighting the social, cultural, legal, and political barriers to gender equality in the areas of violence, rights, and social inclusion. Through Photovoice methodology, the Syrian refugees’ (in)securities in Lebanon were given visibility by enabling local volunteers to record and reflect their realities through pictures, at the same time voice the participants’ anxieties and recommendations to reach normative policy change. This Participatory Action Research approach helped participants observe the structural barriers and lack of culturally inclusive refugee services that hinder security, increase discrimination, stigma, and poverty. The findings have implications for a shift of the refugee protection mechanisms to a community-based approach in ways that extend beyond narrow security policies that hinder women empowerment and raise vulnerabilities such as gendered exploitation, abuse, and neglect.

Keywords: gender, (in)security, Lebanon, refugee, Syrian refugees, women

Procedia PDF Downloads 117
10501 Geographical Information System for Sustainable Management of Water Resources

Authors: Vakhtang Geladze, Nana Bolashvili, Nino Machavariani, Tamazi Karalashvili, Nino Chikhradze, Davit Kartvelishvili

Abstract:

Fresh water deficit is one of the most important global problems today. In the countries with scarce water resources, they often become a reason of armed conflicts. The peaceful settlement of relations connected with management and water consumption issues within and beyond the frontiers of the country is an important guarantee of the region stability. The said problem is urgent in Georgia as well because of its water objects are located at the borders and the transit run-off that is 12% of the total one. Fresh water resources are the major natural resources of Georgia. Despite of this, water supply of population at its Eastern part is an acute issue. Southeastern part of the country has been selected to carry out the research. This region is notable for deficiency of water resources in the country. The region tends to desertification which aggravates fresh water problem even more and presumably may lead to migration of local population from the area. The purpose of study was creation geographical information system (GIS) of water resources. GIS contains almost all layers of different content (water resources, springs, channels, hydrological stations, population water supply, etc.). The results of work provide an opportunity to identify the resource potential of the mentioned region, control and manage it, carry out monitoring and plan regional economy.

Keywords: desertification, GIS, irrigation, water resources

Procedia PDF Downloads 668
10500 Food Security Indicators in Deltaic and Coastal Research: A Scoping Review

Authors: Sylvia Szabo, Thilini Navaratne, Indrajit Pal, Seree Park

Abstract:

Deltaic and coastal regions are often strategically important both from local and regional perspectives. While deltas are known to be bread baskets of the world, delta inhabitants often face the risk of food and nutritional insecurity. These risks are highly exacerbated by the impacts of climate and environmental change. While numerous regional studies examined the prevalence and the determinants of food security in specific delta and coastal regions, there is still a lack of a systematic analysis of the most widely used scientific food security indicators. In order to fill this gap, a systematic review was carried out using Covidence, a Cochrane-adopted systematic review processing software. Papers included in the review were selected from the SCOPUS, Thomson Reuters Web of Science, Science Direct, ProQuest, and Google Scholar databases. Both scientific papers and grey literature (e.g., reports by international organizations) were considered. The results were analyzed by food security components (access, availability, quality, and strategy) and by world regions. Suggestions for further food security, nutrition, and health research, as well as policy-related implications, are also discussed.

Keywords: delta regions, coastal, food security, indicators, systematic review

Procedia PDF Downloads 215
10499 A Platform to Analyze Controllers for Solar Hot Water Systems

Authors: Aziz Ahmad, Guillermo Ramirez-Prado

Abstract:

Governments around the world encourage the use of solar water heating in residential houses due to the low maintenance requirements and efficiency of the solar collector water heating systems. The aim of this work is to study a domestic solar water heating system in a residential building to develop a model of the entire solar water heating system including flat-plate solar collector and storage tank. The proposed model is adaptable to any households and location. The model can be used to test different types of controllers and can provide efficiency as well as economic analysis. The proposed model is based on the heat and mass transfer equations along with assumptions applied in the model which can be modified for a variety of different solar water heating systems and sizes. Simulation results of the model were compared with the actual system which shows similar trends.

Keywords: solar thermal systems, solar water heating, solar collector model, hot water tank model, solar controllers

Procedia PDF Downloads 241
10498 Tehran Province Water and Wastewater Company Approach on Energy Efficiency by the Development of Renewable Energy to Achieving the Sustainable Development Legal Principle

Authors: Mohammad Parvaresh, Mahdi Babaee, Bahareh Arghand, Roushanak Fahimi Hanzaee, Davood Nourmohammadi

Abstract:

Today, the intelligent network of water and wastewater as one of the key steps in realizing the smart city in the world. Use of pressure relief valves in urban water networks in order to reduce the pressure is necessary in Tehran city. But use these pressure relief valves lead to waste water, more power consumption, and environmental pollution because Tehran Province Water and Wastewater Co. use a quarter of industry 's electricity. In this regard, Tehran Province Water and Wastewater Co. identified solutions to reduce direct and indirect costs in energy use in the process of production, transmission and distribution of water because this company has extensive facilities and high capacity to realize green economy and industry. The aim of this study is to analyze the new project in water and wastewater industry to reach sustainable development.

Keywords: Tehran Province Water and Wastewater Company, water network efficiency, sustainable development, International Environmental Law

Procedia PDF Downloads 264
10497 DG Power Plants Placement and Evaluation of its Effect on Improving Voltage Security Margin in Radial Distribution Networks

Authors: Atabak Faramarzpour, Mohsen Mohammadian

Abstract:

In this article, we introduce the stability of power system voltage and state DG power plants placement and its effect on improving voltage security margin in radial distribution networks. For this purpose, first, important definitions in voltage stability area such as small and big voltage disturbances, instability, and voltage collapse, and voltage security definitions are stated. Then, according to voltage collapse time, voltage stability is classified and each one's characteristics are stated.

Keywords: DG power plants, evaluation, voltage security, radial distribution networks

Procedia PDF Downloads 641